Movatterモバイル変換


[0]ホーム

URL:


CN106789911A - A kind of network identity validation method and system based on block chain - Google Patents

A kind of network identity validation method and system based on block chain
Download PDF

Info

Publication number
CN106789911A
CN106789911ACN201611049712.8ACN201611049712ACN106789911ACN 106789911 ACN106789911 ACN 106789911ACN 201611049712 ACN201611049712 ACN 201611049712ACN 106789911 ACN106789911 ACN 106789911A
Authority
CN
China
Prior art keywords
network identity
identity
network
submodule
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611049712.8A
Other languages
Chinese (zh)
Inventor
申屠青春
盛强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Silver Chain Technology Co Ltd
Original Assignee
Shenzhen Silver Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Silver Chain Technology Co LtdfiledCriticalShenzhen Silver Chain Technology Co Ltd
Priority to CN201611049712.8ApriorityCriticalpatent/CN106789911A/en
Publication of CN106789911ApublicationCriticalpatent/CN106789911A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The present invention a kind of network identity validation method and system based on block chain, the method include user with true identity information applications network identity ID;Block catenary system and network identity ID issuers synchrodata;When user signs in website with network identity ID, network identity validation is completed with network identity ID.It is related to the present invention by advance log on identity ID, and record in network identity ID issuers, the data in each node in block catenary system are synchronous with network identity ID issuers, when network identity validation is carried out, network identity ID is verified, only need to provide map network identity ID, true identity leakage is not resulted in, due to block Lian Qu centers, trusted, the characteristics of can not distorting, credit rating can be greatly improved, as long as there is part of nodes also in operation in block catenary system, it is ensured that the operation of whole system, improve operation stability.

Description

A kind of network identity validation method and system based on block chain
Technical field
More specifically refer to that a kind of network identity based on block chain is tested the present invention relates to the technical field of information securityCard method and system.
Background technology
Authentication is also referred to as " authentication " or " identity discriminating ", refers to true in computer and computer network systemRecognize the process of operator's identity, so that it is determined that whether the user has access and the access right to certain resource, and then make meterThe access strategy of calculation machine and network system can be performed reliably and efficiently, prevented attacker from palming off validated user and obtained resourceAccess rights, it is ensured that the safety of system and data, and authorize the legitimate interests of visitor.
The principle of current network identity validation is to verify identity by calling open interface, however, it can easily leakage is usedFamily individual's real information, and anyone can be transferred through the real information data that interface arbitrarily obtains some user, creditSpend low and fluctuation of service.
Therefore, it is necessary to design a kind of network identity validation method based on block chain, realization does not result in true identityLeakage, raising credit rating is low, and good operation stability.
The content of the invention
A kind of defect it is an object of the invention to overcome prior art, there is provided network identity validation side based on block chainMethod and system.
To achieve the above object, the present invention uses following technical scheme:A kind of network identity validation side based on block chainMethod, comprises the following steps:
User is with true identity information applications network identity ID;
Block catenary system and network identity ID issuers synchrodata;
When user signs in website with network identity ID, network identity validation is completed with network identity ID.
Its further technical scheme is:It is described in the step of user is with true identity information applications network identity IDTrue identity information includes identity card or student's identity card or Hongkong and Macro's pass.
Its further technical scheme is:The step of user is with true identity information applications network identity ID, including withLower specific steps:
User is with true identity information to network identity ID issuers log on identity ID;
Network identity ID issuers carry out real-name authentication;
If real-name authentication does not pass through, log on identity ID is unable to;
Or, if real-name authentication passes through, give user one network identity ID.
Its further technical scheme is:If the real-name authentication passes through, the step of to one network identity ID of user itAfterwards, the network identity ID of user is also recorded including network identity ID issuers.
Its further technical scheme is:If the real-name authentication passes through, the step of to one network identity ID of user, bagInclude step in detail below:
The random number of the identity information+128 of user is assembled into character string;
HASH values are calculated to character string;
Gained HASH values will be calculated as network identity ID, user will be fed back to.
Its further technical scheme is:The step of block catenary system is with network identity ID issuer's synchrodatas,Including step in detail below:
Some node synchronizes data at regular intervals with network identity ID issuers in block catenary system;
By in the network identity ID synchronizations of all grantings and the node that is saved in block catenary system;
The node for preserving the network identity ID of all grantings will be sent the network identity ID being synchronized to other nodes.
Its further technical scheme is:It is described when user signs in website with network identity ID, it is complete with network identity IDThe step of into network identity validation, including step in detail below:
When user signs in website with network identity ID, network identity ID is sent to nearest node by website;
After node receives the request of website transmission, whether there is in data base querying network identity ID;
If network identity ID is present, website is returned to message is proved to be successful;
Or, if network identity ID does not exist, failed message is returned to website.
Present invention also offers a kind of network identity validation system based on block chain, including identity application module, synchronizationModule and authentication module;
The identity application module, for user with true identity information applications network identity ID, with the synchronization moduleConnection;
The synchronization module, for block catenary system and network identity ID issuers synchrodata, tests with the identityCard module connection;
The authentication module, for when user signs in website with network identity ID, being completed with network identity IDNetwork identity validation.
Its further technical scheme is:The identity application module includes sending request submodule, real-name authentication submoduleAnd issue identity submodule;
It is described to send request submodule, for user with true identity information to the log on of network identity ID issuersIdentity ID, is connected with the real-name authentication submodule;
The real-name authentication submodule, real-name authentication is carried out for network identity ID issuers, and identity is issued with describedSubmodule is connected;
It is described to issue identity submodule, for giving user one network identity ID, it is connected with the synchronization module.
Its further technical scheme is:The synchronization module includes synchrodata submodule, preserves submodule and grantingSubmodule;
The synchrodata submodule, for some node in block catenary system and network identity ID issuers everyCertain hour synchronizes data, is connected with the identity submodule that issues;
The preservation submodule, for by the network identity ID synchronizations of all grantings and the section that is saved in block catenary systemOn point, it is connected with the synchrodata submodule;
The granting submodule, for preserve all grantings network identity ID node by the network identity being synchronized toID is sent to other nodes, is connected with the preservation submodule and the authentication module respectively.
Compared with the prior art, the invention has the advantages that:A kind of network identity validation based on block chain of the inventionMethod, by advance log on identity ID, and records in network identity ID issuers, each node in block catenary systemInterior data are all synchronous with network identity ID issuers, when network identity validation is carried out, network identity ID verified, it is only necessary to provide map network identity ID, do not result in true identity leakage, due to block Lian Qu centers, trusted,The characteristics of can not distorting, can greatly improve credit rating, as long as there is part of nodes also in operation in block catenary system, it is ensured thatThe operation of whole system, improves operation stability.
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings.
Brief description of the drawings
A kind of flow chart element of network identity validation method based on block chain that Fig. 1 is provided for the specific embodiment of the inventionFigure;
The idiographic flow block diagram of the log on identity ID that Fig. 2 is provided for the specific embodiment of the invention;
The idiographic flow block diagram of the network identity ID generations that Fig. 3 is provided for the specific embodiment of the invention;
The idiographic flow block diagram of the synchrodata that Fig. 4 is provided for the specific embodiment of the invention;
The idiographic flow frame of the use network identity ID completion network identity validations that Fig. 5 is provided for the specific embodiment of the inventionFigure;
A kind of structural frames of network identity validation system based on block chain that Fig. 6 is provided for the specific embodiment of the inventionFigure.
Specific embodiment
In order to more fully understand technology contents of the invention, technical scheme is entered with reference to specific embodimentOne step introduction and explanation, but it is not limited to this.
Specific embodiment as shown in figs. 1 to 6, a kind of network identity validation side based on block chain that the present embodiment is providedMethod, can be used in the process of confirmation operator's identity in computer and computer network system, realize using network identity IDAuthentication is completed, true identity leakage is not resulted in, raising credit rating is low, and good operation stability.
As shown in figure 1, a kind of network identity validation method based on block chain, comprises the following steps:
S1, user are with true identity information applications network identity ID;
S2, block catenary system and network identity ID issuers synchrodata;
S3, when user signs in website with network identity ID, with network identity ID complete network identity validation.
Above-mentioned S1 steps, user is with true identity information applications network identity ID, it is therefore intended that demonstrate,proved with network identity IDBook identifies user identity, wherein the not real information including user, it is to avoid the leakage of user profile, that improves whole network canReliability, network identity ID here is exactly in fact one section of character string
In addition, above-mentioned S1 steps, the step of user is with true identity information applications network identity ID in, the true bodyPart information includes identity card or student's identity card or Hongkong and Macro's pass.
Certainly, in other embodiment, above-mentioned true identity information can also include other certificates, such as fellow villager's card etc..
Further, as shown in Fig. 2 above-mentioned S1 steps, user is with true identity information applications network identity ID'sStep, including step in detail below:
S11, user are with true identity information to network identity ID issuers log on identity ID;
S12, network identity ID issuers carry out real-name authentication;
If S13, real-name authentication do not pass through, log on identity ID is unable to;
S14 or, if real-name authentication passes through, give user one network identity ID.
If the real-name authentication passes through, the step of to one network identity ID of user after, also including S15, network bodyPart ID issuers record the network identity ID of user, and so all users for applying have in network identity ID issuersRecord, is easy to follow-up data syn-chronization.
In addition, the carrier of network identity ID can be USBKEY, bank card, Mobile phone card etc..
Further, as shown in figure 3, the step of S14, if real-name authentication passes through, giving user one network identity IDThe step of, including step in detail below:
S141, the random number of the identity information+128 of user are assembled into character string;
S142, to character string calculate HASH values;
S143, will calculate gained HASH values as network identity ID, feed back to user.
Using HASH values as network identity ID, when being verified to network identity ID, specifically to the one of HASH valuesString numeral is verified that verification process is simple, efficient and accuracy rate is high, also, prevents the possibility for repeating.
Specifically, above-mentioned S141 steps, the random number of the identity information+128 of user is assembled into character string, hereThe identity information of user can be the identification card number of user.
As shown in figure 4, the step of S2 steps, block catenary system and network identity ID issuer's synchrodatas, bagInclude step in detail below:
Some node and network identity ID issuers synchronize number at regular intervals in S21, block catenary systemAccording to;
S22, by the network identity ID synchronizations of all grantings and the node that is saved in block catenary system;
S23, the node of the network identity ID for preserving all grantings will be sent the network identity ID being synchronized to otherNode.
Above-mentioned S23 steps, it is ensured that the data on any one node are all newest, improve the standard of authenticationExactness.
Also, for S2 steps, block catenary system and network identity ID issuers synchrodata, using due to block chainThe characteristics of removing center, trusted, can not distort, credit rating can be greatly improved.
Further, as shown in figure 5, above-mentioned S3 steps, when user signs in website with network identity ID, use netThe step of network identity ID completes network identity validation, including step in detail below:
S31, when user signs in website with network identity ID, network identity ID is sent to nearest node by website;
After S32, node receive the request of website transmission, whether there is in data base querying network identity ID;
If S33, network identity ID are present, website is returned to message is proved to be successful;
S34 or, if network identity ID does not exist, return failed message to website.
Above-mentioned step S31, when user signs in website with network identity ID, website is sent to network identity ID mostNear node, when network identity validation is carried out, it is only necessary to provide map network identity ID, let out so as to not result in true identityDew.
In addition, S32 steps and S33, S34 step, interact for website with block catenary system, no longer it is that tradition is singleServer, improve operation stability, as long as have in block catenary system part of nodes also operation, it is ensured that whole systemOperation.
A kind of above-mentioned network identity validation method based on block chain, by advance log on identity ID, and recordsIn network identity ID issuers, the data in each node in block catenary system are same with network identity ID issuersStep, when network identity validation is carried out, is verified, it is only necessary to provide map network identity ID, no to network identity IDTrue identity can be caused to reveal, due to block Lian Qu centers, trusted, can not distort the characteristics of, credit can be greatly improvedDegree, as long as there is part of nodes also in operation in block catenary system, it is ensured that the operation of whole system, improves stableProperty.
As shown in fig. 6, being a kind of network identity validation system based on block chain that the present embodiment is proposed, including identity ShenPlease module, synchronization module and authentication module;
Identity application module, for user with true identity information applications network identity ID, is connected with synchronization module;
Synchronization module, for block catenary system and network identity ID issuers synchrodata, connects with authentication moduleConnect;
Authentication module, for when user signs in website with network identity ID, network being completed with network identity IDAuthentication.
Further, identity application module includes sending request submodule 10, real-name authentication submodule 20 and issuesIdentity submodule 30;
Request submodule 10 is sent, for user with true identity information to network identity ID issuers log on bodyPart ID, is connected with real-name authentication submodule 20;
Real-name authentication submodule 20, real-name authentication is carried out for network identity ID issuers, and issues identity submodule30 connections;
Identity submodule 30 is issued, for giving user one network identity ID, is connected with synchronization module.
In addition, synchronization module includes synchrodata submodule 40, preserves submodule 50 and provides submodule 60;
Synchrodata submodule 40, for some node in block catenary system and network identity ID issuers every oneFix time and synchronize data, be connected with identity submodule 30 is issued;
Submodule 50 is preserved, for by the network identity ID synchronizations of all grantings and the node that is saved in block catenary systemOn, it is connected with synchrodata submodule 40;
Provide submodule 60, for preserve all grantings network identity ID node by the network identity ID being synchronized toSend to other nodes, be connected with preservation submodule 50 and authentication module respectively.
Authentication module includes sending identity submodule 70, inquiry submodule 80 and notice submodule 90, sends bodyOne's share of expenses for a joint undertaking module 70, for when user signs in website with network identity ID, network identity ID to be sent to nearest section by websitePoint, is connected with the granting submodule 60;Inquiry submodule 80, after receiving the request of website transmission for node, in databaseInquire about network identity ID whether there is, be connected with identity submodule 70 is sent;Submodule 90 is notified, is proved to be successful for handle and disappearedBreath returns to website or returns to failed message to website, is connected with inquiry submodule 80.
Above-mentioned a kind of network identity validation system based on block chain, by the advance log on body of identity application modulePart ID, and recording in network identity ID issuers, synchronization module is by the data and net in each node in block catenary systemThe synchronization of network identity ID issuers, when network identity validation is carried out, is tested network identity ID using authentication moduleCard, it is only necessary to provide map network identity ID, does not result in true identity and reveals, due to block Lian Qu centers, credibleThe characteristics of appointing, can not distort, credit rating can be greatly improved, as long as there is part of nodes also in operation in block catenary system, with regard to energyEnsure the operation of whole system, improve operation stability.
It is above-mentioned that technology contents of the invention are only further illustrated with embodiment, it is easier to understand in order to reader, but notRepresent embodiments of the present invention and be only limitted to this, any technology done according to the present invention extends or recreates, by of the inventionProtection.Protection scope of the present invention is defined by claims.

Claims (10)

CN201611049712.8A2016-11-152016-11-15A kind of network identity validation method and system based on block chainPendingCN106789911A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201611049712.8ACN106789911A (en)2016-11-152016-11-15A kind of network identity validation method and system based on block chain

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201611049712.8ACN106789911A (en)2016-11-152016-11-15A kind of network identity validation method and system based on block chain

Publications (1)

Publication NumberPublication Date
CN106789911Atrue CN106789911A (en)2017-05-31

Family

ID=58912879

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201611049712.8APendingCN106789911A (en)2016-11-152016-11-15A kind of network identity validation method and system based on block chain

Country Status (1)

CountryLink
CN (1)CN106789911A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107786547A (en)*2017-09-302018-03-09厦门快商通信息技术有限公司A kind of auth method based on block chain, device and computer-readable recording medium
CN108183801A (en)*2017-12-292018-06-19中链科技有限公司A kind of service authentication method, system and computer readable storage medium
CN108234478A (en)*2017-12-292018-06-29重庆小犀智能科技有限公司A kind of personal credit information share system and method based on block chain
CN108668277A (en)*2018-04-172018-10-16上海连尚网络科技有限公司 Method and device for sharing and obtaining information
CN108876371A (en)*2018-06-262018-11-23广州友谱网络科技有限公司Consumption data storage based on block chain, data check, data source tracing method
CN108881296A (en)*2018-07-242018-11-23中国联合网络通信集团有限公司Block chain real name identification method, device, equipment and storage medium
CN108900507A (en)*2018-06-292018-11-27全链通有限公司Block chain real name identification method and system
CN109003176A (en)*2018-08-282018-12-14山东浪潮商用系统有限公司A kind of real name based on block chain does tax method and system
WO2018233536A1 (en)*2017-06-192018-12-27阿里巴巴集团控股有限公司 Authentication method, blockchain-based authentication data processing method and device
CN109104285A (en)*2018-07-242018-12-28中国联合网络通信集团有限公司Block chain real name identification method, device, equipment and storage medium
CN109361664A (en)*2018-10-112019-02-19腾讯科技(深圳)有限公司Block chain based data verification method, system and computer readable storage medium
CN109493071A (en)*2018-10-222019-03-19北京首汽智行科技有限公司Auth method based on block chain
CN109600338A (en)*2017-09-302019-04-09卓望数码技术(深圳)有限公司A kind of trusted identity management service method and system
CN109857769A (en)*2019-01-092019-06-07平安科技(深圳)有限公司Drive slip control method, system, equipment and storage medium based on block chain
CN111209589A (en)*2019-12-312020-05-29航天信息股份有限公司 A method and system for dynamic desensitization of data based on blockchain

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102420834A (en)*2011-12-292012-04-18公安部第三研究所Method for generating and checking network identity identification code in network electronic identity card
CN104683306A (en)*2013-12-032015-06-03中国人民公安大学 A Safe and Controllable Internet Real-name Authentication Mechanism
CN105701372A (en)*2015-12-182016-06-22布比(北京)网络技术有限公司Block chain identity construction and verification method
CN105978855A (en)*2016-04-182016-09-28南开大学System and method for protecting personal information security in real-name system
CN106097073A (en)*2016-06-202016-11-09深圳市淘淘谷信息技术有限公司A kind of block chain gives the method for the numeral exclusive ID of account trading process

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102420834A (en)*2011-12-292012-04-18公安部第三研究所Method for generating and checking network identity identification code in network electronic identity card
CN104683306A (en)*2013-12-032015-06-03中国人民公安大学 A Safe and Controllable Internet Real-name Authentication Mechanism
CN105701372A (en)*2015-12-182016-06-22布比(北京)网络技术有限公司Block chain identity construction and verification method
CN105978855A (en)*2016-04-182016-09-28南开大学System and method for protecting personal information security in real-name system
CN106097073A (en)*2016-06-202016-11-09深圳市淘淘谷信息技术有限公司A kind of block chain gives the method for the numeral exclusive ID of account trading process

Cited By (26)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11159506B2 (en)2017-06-192021-10-26Advanced New Technologies Co., Ltd.Authentication method and device, and blockchain-based authentication data processing method and device
WO2018233536A1 (en)*2017-06-192018-12-27阿里巴巴集团控股有限公司 Authentication method, blockchain-based authentication data processing method and device
US11019050B2 (en)2017-06-192021-05-25Advanced New Technologies Co., Ltd.Authentication method and device, and blockchain-based authentication data processing method and device
CN109600338A (en)*2017-09-302019-04-09卓望数码技术(深圳)有限公司A kind of trusted identity management service method and system
CN109600338B (en)*2017-09-302021-11-19卓望数码技术(深圳)有限公司Trusted identity management service method and system
CN107786547A (en)*2017-09-302018-03-09厦门快商通信息技术有限公司A kind of auth method based on block chain, device and computer-readable recording medium
CN108183801A (en)*2017-12-292018-06-19中链科技有限公司A kind of service authentication method, system and computer readable storage medium
CN108234478A (en)*2017-12-292018-06-29重庆小犀智能科技有限公司A kind of personal credit information share system and method based on block chain
CN108183801B (en)*2017-12-292023-04-25苏州朗润创新知识产权运营有限公司Service authentication method, system and computer readable storage medium
CN108668277A (en)*2018-04-172018-10-16上海连尚网络科技有限公司 Method and device for sharing and obtaining information
US11588642B2 (en)2018-04-172023-02-21Shanghai Lianshang Network Technology Co., Ltd.Method and apparatus for sharing and acquiring information
CN108668277B (en)*2018-04-172020-01-14上海连尚网络科技有限公司Method and equipment for sharing and acquiring information
CN108876371B (en)*2018-06-262021-01-29广州天高软件科技有限公司Consumption data storage, data verification and data source tracing method based on block chain
CN108876371A (en)*2018-06-262018-11-23广州友谱网络科技有限公司Consumption data storage based on block chain, data check, data source tracing method
CN108900507A (en)*2018-06-292018-11-27全链通有限公司Block chain real name identification method and system
CN108900507B (en)*2018-06-292020-12-22全链通有限公司Block chain real-name authentication method and system
CN109104285B (en)*2018-07-242021-01-26中国联合网络通信集团有限公司 Blockchain real-name authentication method, device, equipment and storage medium
CN109104285A (en)*2018-07-242018-12-28中国联合网络通信集团有限公司Block chain real name identification method, device, equipment and storage medium
CN108881296B (en)*2018-07-242021-11-30中国联合网络通信集团有限公司Block chain real-name authentication method, device, equipment and storage medium
CN108881296A (en)*2018-07-242018-11-23中国联合网络通信集团有限公司Block chain real name identification method, device, equipment and storage medium
CN109003176A (en)*2018-08-282018-12-14山东浪潮商用系统有限公司A kind of real name based on block chain does tax method and system
CN109361664A (en)*2018-10-112019-02-19腾讯科技(深圳)有限公司Block chain based data verification method, system and computer readable storage medium
CN109361664B (en)*2018-10-112021-05-11腾讯科技(深圳)有限公司Block chain based data verification method, system and computer readable storage medium
CN109493071A (en)*2018-10-222019-03-19北京首汽智行科技有限公司Auth method based on block chain
CN109857769A (en)*2019-01-092019-06-07平安科技(深圳)有限公司Drive slip control method, system, equipment and storage medium based on block chain
CN111209589A (en)*2019-12-312020-05-29航天信息股份有限公司 A method and system for dynamic desensitization of data based on blockchain

Similar Documents

PublicationPublication DateTitle
CN106789911A (en)A kind of network identity validation method and system based on block chain
US11444782B2 (en)Dynamically managing exchanges of data using a distributed ledger and homomorphic commitments
US20230370257A1 (en)Methods and systems of providing verification of information using a centralized or distributed ledger
US20200250676A1 (en)Blockchain architecture with record security
JP6880055B2 (en) Message anti-counterfeiting implementation method and device
CN105871786B (en)A kind of verification method of user information, device and system
US10200407B1 (en)Network gateway messaging systems and methods
CN110598433B (en)Block chain-based anti-fake information processing method and device
CN106650495A (en)File verification method and device
CN109245897B (en) A node authentication method and device based on non-interactive zero-knowledge proof
CN107317807A (en)A kind of apparatus bound method, apparatus and system
JP2018533131A (en) Authentication service customer data management method and system
CN107566393A (en)A kind of dynamic rights checking system and method based on trust certificate
CN111371555A (en)Signature authentication method and system
CN113129008B (en)Data processing method, device, computer readable medium and electronic equipment
CN106992864A (en) A real-name authentication method, device and system
CN112581136A (en)Block data structure of block chain, account book data structure, management method and device
CN110336772A (en)Web data automatic evidence-collecting method and equipment based on encrypted authentication server
US12132728B2 (en)Trusted identification of enrolling users based on images and unique identifiers associated with sponsoring users
Lee et al.Real-time adult authentication scheme for digital contents using X. 509 certificate in ubiquitous Web environment
CN119720288A (en) Blockchain-based document signing method, device, electronic device and storage medium
HK1204724B (en)Method for service authentication, system and server thereof
HK1204724A1 (en)Method for service authentication, system and server thereof
CN105512536A (en)Resource transfer method based on security certification
HK1209931B (en)Method of processing requests for digital services

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20170531

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp